CERTIFYING A VIRTUAL ENTITY IN A VIRTUAL UNIVERSE
An invention for certifying a virtual entity in a virtual universe is disclosed. A virtual business may opt to register with a security certificate administration center to obtain a security certificate. A user of another virtual entity is provided with an ability to initiate a verifying process to check whether a security certificate symbol or a graphic resembling a security certificate symbol represents a valid security certificate. Virtual universe client and server software may be modified to enable a secured connection between the user and the security certificate administration center for the verification.
This invention relates generally to virtual universes, and more specifically to certifying a virtual entity in a virtual universe.
BACKGROUND OF THE INVENTIONVirtual universes or virtual worlds are computer-based simulated environments intended for its users to inhabit and interact via avatars, which are graphical representations that others can see. An avatar often takes the form of a cartoon-like human character. An agent is a user's account with a virtual universe, upon which the user can build an avatar. The agent is tied to the inventory of assets the user owns. These types of virtual universes are now common in massive multi-player online games, such as Second Life (Second Life is a trademark of Linden Research in the United States, other countries, or both). Avatars in the virtual universes can do a wide range of business and/or social activities. Virtual universes may include other virtual entities such as a virtual store, a virtual club, an article, etc. Each virtual entity including an avatar is assigned with a universally unique identification (UUID) in the virtual universe.
A variety of fraudulent behaviors may be conducted in virtual universes. For example, phishing refers to a form of fraud in which an entity, such as a website or a virtual store, masquerades as another entity by, e.g., copying the other entity's appearance and/or other characteristics. The goal of the fraudulent emulation is to, e.g., lure visitors into providing personal or financial information, which the fraudulent/phishing entity may use for monetary gains.
SUMMARY OF THE INVENTIONIn one embodiment, there is a method for certifying a virtual entity in a virtual universe. In this embodiment, the method comprises: providing a certifying mechanism for a first virtual entity to certify with a security certificate administration center and be granted a security certificate; providing a checking mechanism for a second virtual entity to initiate a verification process to verify whether a symbol associated with a third virtual entity represents a valid security certificate; passing the initiated verification process to the security certificate administration center to determine the validity; and outputting a result of the validity determination.
In a second embodiment, there is a system for certifying a virtual entity in a virtual universe. In this embodiment, the system comprises: a certifying mechanism for a first virtual entity to certify with a security certificate administration center and be granted a security certificate; and a checking mechanism for a second virtual entity to initiate a verification process to verify whether a symbol associated with a third virtual entity represents a valid security certificate, the checking mechanism passes the initiated verification process to the security certificate administration center to determine the validity.
In a third embodiment, there is a computer program product embodied in a computer readable medium. In this embodiment, the computer program product comprises computer usable program code which, when executed by a computer system, enables the computer system to: provide a certifying mechanism for a first virtual entity to certify with a security certificate administration center and be granted a security certificate; provide a checking mechanism for a second virtual entity to initiate a verification process to verify whether a symbol associated with a third virtual entity represents a valid security certificate; pass the initiated verification process to the security certificate administration center to determine the validity; and output a result of the validity determination.
In a fourth embodiment, there is a method for providing a system for certifying a virtual entity in a virtual universe. In this embodiment, the method comprises at least one of: creating, maintaining, deploying or supporting a computer infrastructure being operable to: provide a certifying mechanism for a first virtual entity to certify with a security certificate administration center and be granted a security certificate; provide a checking mechanism for a second virtual entity to initiate a verification process to verify whether a symbol associated with a third virtual entity represents a valid security certificate; pass the initiated verification process to the security certificate administration center to determine the validity; and output a result of the validity determination.
Other aspects and features of the present invention, as defined solely by the claims, will become apparent to those ordinarily skilled in the art upon review of the following non-limited detailed description of the invention in conjunction with the accompanying figures.
It is noted that the drawings of the invention are not to scale. The drawings are intended to depict only typical aspects of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements among the drawings.
DETAILED DESCRIPTION OF THE INVENTIONThe following detailed description of embodiments refers to the accompanying drawings, which illustrate specific embodiments of the invention. Other embodiments having different structures and operations do not depart from the scope of the present invention.
1. System OverviewVirtual world server 14 may include a certificate checking unit 34 which is communicatively coupled to an interface of virtual world client/agent 32 such that the interface may be modified by certificate checking unit 34 to enable a secured communication to/through certificate checking unit 34 which may trigger the operation of certificate checking unit 34.
Certificate administration center 16 may reside in a computer system 15 and may include a certifying unit 38, a verifying unit 40, a security unit 42, and an implementation unit 44. Other component(s) required for the operation of certificate administration center 16 may also be included as is understood in the art.
According to an embodiment, computer system 15 can comprise any general purpose computing article of manufacture capable of executing computer program code installed thereon to perform the process described herein. The computer infrastructure can also comprise any specific purpose computing article of manufacture comprising hardware and/or computer program code for performing specific functions, any computing article of manufacture that comprises a combination of specific purpose and general purpose hardware/software, or the like. In each case, the program code and hardware can be created using standard programming and engineering techniques, respectively.
As should be appreciated, virtual world server 14 and certificate administration center 16 and components thereof may be positioned at the same physical location or may be at different physical locations. According to an embodiment, certificate administration center 16 is independent/separate to virtual universe 24 and/or virtual world server 14. However, other embodiment is also possible. For example, certificate administration center 16 or part of its functional components may be provided by virtual world server 14. The interaction of system 10 components will be described herein in detail.
2. Operation MethodologyAn embodiment of the interaction/operation of system 10 components is shown in the flow diagram of
If the checking of the certificate information does not go through successfully, i.e., “No” at sub-process 102, certifying unit 38 may reject the applied certification in sub-process 104.
As represented by arrow 210, information/result of process 200 may also be communicated to/saved and retrievable by certifying unit 38 in sub-process 101, as will be described further herein. Accordingly to an embodiment, the certifying process 100 and the data communications 110, 210 are implemented in a secured manner. For example, security unit 42 may use cryptography to secure the data communication(s) between and among various components of system 10.
Verifying process 200 may also include multiple sub-processes. In sub-process 201, a (second) virtual entity 28/30, e.g., an avatar 28, initiates a verification process to verify whether a symbol associated with a (third) virtual entity 30 represents a valid security certificate. The symbol may be a certificate symbol or may be a symbol that looks like a certificate symbol. The (second) virtual entity 28/30, e.g., an avatar 28, may initial the verification process by clicking on the symbol or by communicating such an initiation request in other manner, e.g., through an interface of the agent/client 32 to certificate checking unit 34.
In sub-process 202, certificate checking unit 34 may pass the initiated verification process to verifying unit 40 of certificate administration center 16. Any method may be used to implement the passing. For example, the passing may be achieved by modifying the current virtual universe server software. In addition, by further modifying the client/agent 32 software of the (second) virtual entity 28, a secured connection may be established between the (second) virtual entity 28 and verifying unit 40. Security unit 42 may secure the connection by, e.g., cryptography. Establishing of a secured connection can be achieved using current technologies. Note that as a virtual entity 28/30 is a representation of user 12 rendered by agent/client 32, the establishing of a secured connection between the (second) virtual entity 28/30 with verifying unit 40 includes the situation that the connection is between user 12 or agent/client 32 and verifying unit 40. Through the secured connection, the information of the (third) virtual entity 30 whose symbol is being checked will be communicated to verifying unit 40. For example, the UUID, location coordinate, store name, and user ID of the (third) virtual entity 30 may be communicated to verifying unit 40 for verification.
In sub-process 203, verifying unit 40 performs the verification and communicates the verification result to the (second) virtual entity 28 requesting/ initiating the verification and/or an administrator of virtual universe 24. The verifying may be implemented by comparing the received information of the (third) virtual entity 30 to be checked with the saved information of the certified (first) virtual entities 30. If the received information of the (third) virtual entity 30 matches the saved information of a (first) virtual entity, the symbol under checking will be treated as representing a valid certificate. If no such matching is found, the symbol under checking will be treated as invalid.
The communication of the verification result to the (second) virtual entity 28 initiating the verification process may be implemented in various manners. For example, a secured communication may be generated by verifying unit 40 and sent to the agent/client 32 of the (second) virtual entity 28. Alternative, verifying unit 40 may control the client/agent 32 of the (second) virtual entity to create a message separately to the rendering of the virtual universe. For example, the client/agent 32 may render the symbol to green color to indicate a valid certificate and to red color to indicate an invalid certificate. In addition, details of the invalid certificate may also be included in the communication. For example, it may be indicated that the symbol under checking is a certificate symbol but does not belong to the (third) virtual entity 30, or that the certificate symbol belongs to the (third) virtual entity but is expired.
Referring back to
While shown and described herein as a method and system for certifying a virtual entity in a virtual universe, it is understood that the invention further provides various alternative embodiments. For example, in an embodiment, the invention provides a program product stored on a computer-readable medium, which when executed, enables a computer infrastructure to certify a virtual entity in a virtual universe. To this extent, the computer-readable medium includes program code, such as certificate checking unit 34 and/or certificate administration center 16 (
In another embodiment, the invention provides a method of providing a system for certifying a virtual entity in a virtual universe. In this case, a computer system, such as administrator computer system 15 and virtual world server 14 (
It should be appreciated that the teachings of the present invention could be offered as a business method on a subscription or fee basis. For example, a certificate administration center 16 (
As used herein, it is understood that the terms “program code” and “computer program code” are synonymous and mean any expression, in any language, code or notation, of a set of instructions that cause a computing device having an information processing capability to perform a particular function either directly or after any combination of the following: (a) conversion to another language, code or notation; (b) reproduction in a different material form; and/or (c) decompression. To this extent, program code can be embodied as one or more types of program products, such as an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing and/or I/O device, and the like. Further, it is understood that the terms “component” and “system” are synonymous as used herein and represent any combination of hardware and/or software capable of performing some function(s).
The flowcharts and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, elements, components, and/or groups thereof.
Although specific embodiments have been illustrated and described herein, those of ordinary skill in the art appreciate that any arrangement which is calculated to achieve the same purpose may be substituted for the specific embodiments shown and that the invention has other applications in other environments. This application is intended to cover any adaptations or variations of the present invention. The following claims are in no way intended to limit the scope of the invention to the specific embodiments described herein.
Claims
1. A method for certifying a virtual entity in a virtual universe, comprising:
- providing a certifying mechanism for a first virtual entity to certify with a certificate administration center and be granted a security certificate;
- providing a checking mechanism for a second virtual entity to initiate a verification process to verify whether a symbol associated with a third virtual entity represents a valid security certificate;
- passing the initiated verification process to the certificate administration center to determine the validity; and
- outputting a result of the validity determination.
2. The method of claim 1, wherein the certifying includes associating a security certificate symbol with the first virtual entity, the security certificate symbol capable of being viewed by the second virtual entity.
3. The method of claim 1, wherein the security certificate symbol is locked with the first virtual entity.
4. The method of claim 1, wherein the certifying includes associating a security certificate with at least one of: security certificate information, a user applying the security certificate for the first virtual entity, or a universally unique identification of the first virtual entity.
5. The method of claim 1, wherein the certifying is implemented in a secured manner.
6. The method of claim 1, wherein the passing includes establishing a secured connection between the second virtual entity and the security certificate administration center.
7. The method of claim 6, wherein the establishing is enabled through a modification of a virtual universe client used by a user of the second virtual entity.
8. The method of claim 1, wherein the checking mechanism is deployed in a server of the virtual universe.
9. A system for certifying a virtual entity in a virtual universe, comprising:
- a certifying mechanism for a first virtual entity to certify with a security certificate administration center and be granted a security certificate; and
- a checking mechanism for a second virtual entity to initiate a verification process to verify whether a symbol associated with a third virtual entity represents a valid security certificate, the checking mechanism passes the initiated verification process to the security certificate administration center to determine the validity.
10. The system of claim 9, wherein the certifying means associates a security certificate symbol with the first virtual entity, the security certificate symbol capable of being viewed by the second virtual entity.
11. The system of claim 9, wherein the certifying mechanism locks security certificate symbol with the first virtual entity.
12. The system of claim 9, wherein the certifying mechanism associates a security certificate with at least one of: security certificate information, a user applying the security certificate for the first virtual entity, or a universally unique identification of the first virtual entity.
13. The system of claim 9, further comprising a means for implements the certifying in a secured manner.
14. The system of claim 9, wherein the checking mechanism establishes a secured connection between the second virtual entity and the security certificate administration center.
15. The system of claim 14, wherein the establishing is enabled through a modification of a virtual universe client used by a user of the second virtual entity.
16. The system of claim 9, wherein the checking mechanism is deployed in a server of the virtual universe.
17. A computer program product embodied in a computer readable medium comprising:
- computer usable program code which, when executed by a computer system, enables the computer system to:
- provide a certifying mechanism for a first virtual entity to certify with a security certificate administration center and be granted a security certificate;
- provide a checking mechanism for a second virtual entity to initiate a verification process to verify whether a symbol associated with a third virtual entity represents a valid security certificate;
- pass the initiated verification process to the security certificate administration center to determine the validity; and
- output a result of the validity determination.
18. The program product of claim 17, wherein the program code is further configured to enable the computer system to associate a security certificate symbol with the first virtual entity, the security certificate symbol capable of being viewed by the second virtual entity.
19. The program product of claim 17, wherein the program code is further configured to enable the computer system to lock security certificate symbol with the first virtual entity.
20. The program product of claim 17, wherein the program code is further configured to enable the computer system to associate a security certificate with at least one of: security certificate information, a user applying the security certificate for the first virtual entity, or a universally unique identification of the first virtual entity.
21. The program product of claim 17, wherein the program code is further configured to enable the computer system to implement the certifying in a secured manner.
22. The program product of claim 17, wherein the program code is further configured to enable the computer system to establish a secured connection between the second virtual entity and the security certificate administration center.
23. The program product of claim 22, wherein the establishing is enabled through a modification of a virtual universe client used by a user of the second virtual entity.
24. A method for providing a system for certifying a virtual entity in a virtual universe, comprising:
- at least one of: creating, maintaining, deploying or supporting a computer infrastructure being operable to:
- provide a certifying mechanism for a first virtual entity to certify with a security certificate administration center and be granted a security certificate;
- provide a checking mechanism for a second virtual entity to initiate a verification process to verify whether a symbol associated with a third virtual entity represents a valid security certificate;
- pass the initiated verification process to the security certificate administration center to determine the validity; and
- output a result of the validity determination.
25. The method of claim 24, wherein computer infrastructure is further operable to establish a secured connection between the second virtual entity and the security certificate administration center
Type: Application
Filed: Mar 25, 2008
Publication Date: Oct 1, 2009
Patent Grant number: 8688975
Inventors: Rick A. Hamilton, II (Charlottesville, VA), Brian M. O'Connell (Cary, NC), Clifford A. Pickover (Yorktown Heights, NY), Keith R. Walker (Austin, TX)
Application Number: 12/054,936